ICITS 2015 - 8th International Conference on Information-Theoretic Security
Date2015-05-02 - 2015-05-05
Deadline2014-11-21
VenueLugano, Switzerland
Keywords
Websitehttps://icits2015.net
Topics/Call fo Papers
8th International Conference on Information-Theoretic Security (ICITS)
May 2-5, 2015, Lugano, Switzerland
ICITS is a conference about all aspects of information-theoretic security and brings together the leading researchers in the areas of cryptography, information theory and quantum information. It is the successor conference to the 2005 IEEE Information-Theory Workshop on Theory and Practice in Information-Theoretic Security (ITW 2005) on Awaji Island, Japan. Previous ICITS conferences were held in:
ICITS 2013 in Singapore.
ICITS 2012 in Montreal, Canada.
ICITS 2011 in Amsterdam, The Netherlands.
ICITS 2009 in Shizuoka, Japan,
ICITS 2008 in Calgary, Canada,
ICITS 2007 in Madrid, Spain,
ICITS 2015 will be held from May 2 to 5, and it takes place at Università della Svizzera italiana (USI) in Lugano, Switzerland.
Topics of interest include (but are not restricted to):
Physical layer security
Multiparty computation
Codes, lattices, & cryptography
Authentication codes
Randomness extraction
Cryptography from noisy channels
Wiretap channels
Bounded-storage models
Information-theoretic reductions
Quantum cryptography
Quantum information theory
Nonlocality and nonsignaling
Key and message rates
Secret sharing
Physical models & assumptions
Network coding security
Adversarial channel models
Information-theoretic tools in computational settings
Implementation challenges
Biometric security
The proceedings of the conference will be published by Springer in Lecture Notes in Computer Science.
Conference Organization
General Chairs:
Anja Lehmann (IBM Research, Zurich, Switzerland)
Stefan Wolf (USI Lugano, Switzerland)
Program Chairs:
Anja Lehmann (IBM Research, Zurich, Switzerland)
Stefan Wolf (USI Lugano, Switzerland)
Program Committee
Paulo Barreto (University of São Paulo, Brazil)
Mario Berta (Caltech, USA)
Anne Broadbent (University of Ottawa, Canada)
Roger Colbeck (University of York, UK)
Paolo D'Arco (University of Salerno, Italy)
Frédéric Dupuis (Aarhus University, Denmark)
Stefan Dziembowski (University of Warsaw, Poland)
Sebastian Faust (EPF Lausanne, Switzerland)
Omar Fawzi (ENS Lyon, France)
Peter Gazi (IST, Austria)
Yuval Ishai (Technion, Israel)
Anja Lehmann (IBM Research Zurich, Switzerland)
Keith Martin (Royal Holloway, University of London, UK)
Prakash Narayan (University of Maryland, USA)
Anderson Nascimento (University of Washington Tacoma, USA)
Koji Nuida (AIST, Japan)
Frédérique Oggier (NTU, Singapore)
Claudio Orlandi (Aarhus University, Denmark)
Carles Padro (Polytechnic University of Catalonia, Spain)
Rei Safavi-Naini (University of Calgary, Canada)
Marco Tomamichel (University of Sidney, Australia)
Stefan Wolf (USI Lugano, Switzerland)
Mark Zhandry (Stanford University, USA)
May 2-5, 2015, Lugano, Switzerland
ICITS is a conference about all aspects of information-theoretic security and brings together the leading researchers in the areas of cryptography, information theory and quantum information. It is the successor conference to the 2005 IEEE Information-Theory Workshop on Theory and Practice in Information-Theoretic Security (ITW 2005) on Awaji Island, Japan. Previous ICITS conferences were held in:
ICITS 2013 in Singapore.
ICITS 2012 in Montreal, Canada.
ICITS 2011 in Amsterdam, The Netherlands.
ICITS 2009 in Shizuoka, Japan,
ICITS 2008 in Calgary, Canada,
ICITS 2007 in Madrid, Spain,
ICITS 2015 will be held from May 2 to 5, and it takes place at Università della Svizzera italiana (USI) in Lugano, Switzerland.
Topics of interest include (but are not restricted to):
Physical layer security
Multiparty computation
Codes, lattices, & cryptography
Authentication codes
Randomness extraction
Cryptography from noisy channels
Wiretap channels
Bounded-storage models
Information-theoretic reductions
Quantum cryptography
Quantum information theory
Nonlocality and nonsignaling
Key and message rates
Secret sharing
Physical models & assumptions
Network coding security
Adversarial channel models
Information-theoretic tools in computational settings
Implementation challenges
Biometric security
The proceedings of the conference will be published by Springer in Lecture Notes in Computer Science.
Conference Organization
General Chairs:
Anja Lehmann (IBM Research, Zurich, Switzerland)
Stefan Wolf (USI Lugano, Switzerland)
Program Chairs:
Anja Lehmann (IBM Research, Zurich, Switzerland)
Stefan Wolf (USI Lugano, Switzerland)
Program Committee
Paulo Barreto (University of São Paulo, Brazil)
Mario Berta (Caltech, USA)
Anne Broadbent (University of Ottawa, Canada)
Roger Colbeck (University of York, UK)
Paolo D'Arco (University of Salerno, Italy)
Frédéric Dupuis (Aarhus University, Denmark)
Stefan Dziembowski (University of Warsaw, Poland)
Sebastian Faust (EPF Lausanne, Switzerland)
Omar Fawzi (ENS Lyon, France)
Peter Gazi (IST, Austria)
Yuval Ishai (Technion, Israel)
Anja Lehmann (IBM Research Zurich, Switzerland)
Keith Martin (Royal Holloway, University of London, UK)
Prakash Narayan (University of Maryland, USA)
Anderson Nascimento (University of Washington Tacoma, USA)
Koji Nuida (AIST, Japan)
Frédérique Oggier (NTU, Singapore)
Claudio Orlandi (Aarhus University, Denmark)
Carles Padro (Polytechnic University of Catalonia, Spain)
Rei Safavi-Naini (University of Calgary, Canada)
Marco Tomamichel (University of Sidney, Australia)
Stefan Wolf (USI Lugano, Switzerland)
Mark Zhandry (Stanford University, USA)
Other CFPs
- Conference on Theoretical Foundations of Machine Learning (TFML 2015)
- Special Session on Data Stream Classification and Big Data Analytics (DSBD2015)
- Special Session on Perception: Recent Developments and Applications
- 9 International Conference on Computer Recognition Systems
- Special Track "Technical Didactics Software Engineering" (TDSE)
Last modified: 2014-10-08 22:48:43